Who are you, and who are we? Looking through some key words
نویسندگان
چکیده
منابع مشابه
Who Are You?
M any security mechanisms, including authorization, depend on the proper handling of identity, but it’s hard to get right. To understand why, we must examine, fundamentally, what identity is. One traditional answer is that an identity is a name. That’s unsatisfactory, for several reasons. First, a name points to an object—an entity—but is not itself that object. Second, authentication is needed...
متن کاملWho Are You?
Most automatic recognition systems are focused on recognizing, given a single mug-shot of an individual, any new image of that individual. Most verification systems are designed to authenticate an identity provided by the user. However, the previous work rarely focus on the problem of detecting when a new individual, i.e. an unknown one, is present. The goal of the work presented in this paper ...
متن کاملWho Are You?
The internet has become central to commerce, international and domestic, and multimedia technology is at the core of this explosive growth. The future is virtually unlimited with but one significant and growing concern – protection of the privacy of the individuals employing the internet (or identified in the many repositories of businesses that record information on their customers to better s...
متن کاملNarrative Construction Kits: "Who Am I? Who Are You? What Are We?"
This paper proposes narrative construction kits as powerful tools to help children and teenagers explore identity and values as dynamic complex constructions. The metaphor of a construction kit suggests that users can combine building blocks (e.g. aspects of the self), program them with storytelling behaviors and try them out in interactions with others. By integrating storytelling and computat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Health Expectations
سال: 1999
ISSN: 1369-6513,1369-7625
DOI: 10.1046/j.1369-6513.1999.00034.x